"Fossies" - the Fresh Open Source Software Archive  

Source code changes of the file "doc/OSP.xml" between
ospd-2.0.0.tar.gz and ospd-2.0.1.tar.gz

About: OSPd is a base class for scanner wrappers which share the same communication protocol: OSP (OpenVAS Scanner Protocol).

OSP.xml  (ospd-2.0.0):OSP.xml  (ospd-2.0.1)
<?xml version="1.0"?> <?xml version="1.0"?>
<!-- <!--
Copyright (C) 2014-2018 Greenbone Networks GmbH Copyright (C) 2014-2019 Greenbone Networks GmbH
SPDX-License-Identifier: GPL-2.0-or-later SPDX-License-Identifier: GPL-2.0-or-later
This program is free software; you can redistribute it and/or This program is free software; you can redistribute it and/or
modify it under the terms of the GNU General Public License modify it under the terms of the GNU General Public License
as published by the Free Software Foundation; either version 2 as published by the Free Software Foundation; either version 2
of the License, or (at your option) any later version. of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of but WITHOUT ANY WARRANTY; without even the implied warranty of
skipping to change at line 181 skipping to change at line 181
</element> </element>
<element> <element>
<name>target</name> <name>target</name>
<summary>A scan target consisting of hosts, a port selection and credentials </summary> <summary>A scan target consisting of hosts, a port selection and credentials </summary>
<pattern> <pattern>
<e>hosts</e> <e>hosts</e>
<e>ports</e> <e>ports</e>
<e>credentials</e> <e>credentials</e>
<e>exclude_hosts</e> <e>exclude_hosts</e>
<e>finished_hosts</e>
</pattern> </pattern>
<ele> <ele>
<name>hosts</name> <name>hosts</name>
<summary>One or many hosts. The list is comma-separated. Each entry can be a IP address, a CIDR notation, a hostname, a IP range. IPs can be v4 or v6</sum mary> <summary>One or many hosts. The list is comma-separated. Each entry can be a IP address, a CIDR notation, a hostname, a IP range. IPs can be v4 or v6</sum mary>
<type>string</type> <type>string</type>
</ele> </ele>
<ele> <ele>
<name>ports</name> <name>ports</name>
<type>string</type> <type>string</type>
<summary>A list of ports that is the same for the given hosts</summary> <summary>A list of ports that is the same for the given hosts</summary>
</ele> </ele>
<ele> <ele>
<name>credentials</name> <name>credentials</name>
<summary>One or many credentials containing the credential for the given h osts.</summary> <summary>One or many credentials containing the credential for the given h osts.</summary>
<pattern> <pattern>
<e>credential</e> <e>credential</e>
</pattern> </pattern>
</ele> </ele>
<ele> <ele>
<name>exclude_hosts</name> <name>exclude_hosts</name>
<summary>One or many hosts to exclude. The list is comma-separated. Each e <summary>One or many hosts to exclude. The list is comma-separated. Each e
ntry can be a IP address, a CIDR notation, a hostname, a IP range. IPs can be v4 ntry can be a IP address, a CIDR notation, a hostname, a IP range. IPs can be v4
or v6. The listed hosts will be set as finished before starting the scan. Each or v6. Each wrapper must handle the exclude hosts.
wrapper must handle the exclude hosts. </summary>
<type>string</type>
</ele>
<ele>
<name>finished_hosts</name>
<summary>One or many finished hosts to exclude when resuming a task. The l
ist is comma-separated. Each entry can be an IP address, a CIDR notation, a host
name, a IP range. IPs can be v4 or v6. The listed hosts will be set as finished
before starting the scan. Each wrapper must handle the finished hosts.
</summary> </summary>
<type>string</type> <type>string</type>
</ele> </ele>
<example> <example>
<summary>Target without credentials.</summary> <summary>Target without credentials.</summary>
<e> <e>
<target> <target>
<hosts>example.org</hosts> <hosts>example.org</hosts>
<ports>T:22,U:5060</ports> <ports>T:22,U:5060</ports>
</target> </target>
skipping to change at line 225 skipping to change at line 232
<summary>Target with two credentials.</summary> <summary>Target with two credentials.</summary>
<e> <e>
<target> <target>
<hosts>192.168.1.0/24</hosts> <hosts>192.168.1.0/24</hosts>
<ports>1,2,3,80,443</ports> <ports>1,2,3,80,443</ports>
<credentials> <credentials>
<credential>...</credential> <credential>...</credential>
<credential>...</credential> <credential>...</credential>
</credentials> </credentials>
<exclude_hosts>192.168.1.10-15</exclude_hosts> <exclude_hosts>192.168.1.10-15</exclude_hosts>
<finished_hosts>192.168.1.1-3</finished_hosts>
</target> </target>
</e> </e>
</example> </example>
</element> </element>
<element> <element>
<name>vt_group</name> <name>vt_group</name>
<summary>Collection of Vulnerability Test</summary> <summary>Collection of Vulnerability Test</summary>
<pattern> <pattern>
<attrib> <attrib>
skipping to change at line 877 skipping to change at line 885
<name>name</name> <name>name</name>
</ele> </ele>
<ele> <ele>
<creation_time>creation_time</creation_time> <creation_time>creation_time</creation_time>
</ele> </ele>
<ele> <ele>
<modification_time>modification_time</modification_time> <modification_time>modification_time</modification_time>
</ele> </ele>
<ele> <ele>
<name>params</name> <name>params</name>
<pattern>
<e>param</e>
</pattern>
<ele>
<name>param</name>
<pattern>
<attrib>
<name>type</name>
<type>string</type>
</attrib>
<attrib>
<name>id</name>
<type>string</type>
</attrib>
</pattern>
</ele>
</ele> </ele>
<ele> <ele>
<name>refs</name> <name>refs</name>
<pattern> <pattern>
<e>ref</e> <e>ref</e>
</pattern> </pattern>
<ele> <ele>
<name>ref</name> <name>ref</name>
<pattern> <pattern>
<attrib> <attrib>
skipping to change at line 899 skipping to change at line 923
</attrib> </attrib>
<attrib> <attrib>
<name>id</name> <name>id</name>
<type>string</type> <type>string</type>
</attrib> </attrib>
</pattern> </pattern>
</ele> </ele>
</ele> </ele>
<ele> <ele>
<name>dependencies</name> <name>dependencies</name>
<pattern>
<e>dependency</e>
</pattern>
<ele>
<name>dependency</name>
<pattern>
<attrib>
<name>vt_id</name>
<type>vt_id</type>
</attrib>
</pattern>
</ele>
</ele> </ele>
<ele> <ele>
<name>summary</name> <name>summary</name>
</ele> </ele>
<ele> <ele>
<name>impact</name> <name>impact</name>
</ele> </ele>
<ele> <ele>
<name>affected</name> <name>affected</name>
</ele> </ele>
<ele> <ele>
<name>insight</name> <name>insight</name>
</ele> </ele>
<ele> <ele>
<name>solution</name> <name>solution</name>
<pattern>
<attrib>
<name>type</name>
<summary>Solution type, for example "VendorFix"</summary>
<type>string</type>
</attrib>
</pattern>
</ele> </ele>
<ele> <ele>
<name>detection</name> <name>detection</name>
</ele> </ele>
<ele> <ele>
<name>severities</name> <name>severities</name>
<pattern> <pattern>
<e>seveirty</e> <e>severity</e>
</pattern> </pattern>
<ele> <ele>
<name>seveirty</name> <name>severity</name>
<pattern> <pattern>
<attrib> <attrib>
<name>type</name> <name>type</name>
<type>string</type> <type>string</type>
</attrib> </attrib>
<attrib> <attrib>
<name>origin</name> <name>origin</name>
<summary>Optional reference to the origin of the severity</sum mary> <summary>Optional reference to the origin of the severity</sum mary>
<type>string</type> <type>string</type>
</attrib> </attrib>
skipping to change at line 980 skipping to change at line 1023
<vt id="1.2.3.4.5"> <vt id="1.2.3.4.5">
<name>Check for presence of vulnerability X</name> <name>Check for presence of vulnerability X</name>
<refs> <refs>
<ref id="2014-16494" type="fedora" /> <ref id="2014-16494" type="fedora" />
<ref id="https://lists.fedoraproject.org/" type="url" /> <ref id="https://lists.fedoraproject.org/" type="url" />
<ref id="CVE-2014-9116" type="cve" /> <ref id="CVE-2014-9116" type="cve" />
</refs> </refs>
<dependencies> <dependencies>
<dependency vt_id="1.3.6.1.4.1.25623.1.0.50282" /> <dependency vt_id="1.3.6.1.4.1.25623.1.0.50282" />
</dependencies> </dependencies>
<creation_time>2015-02-15 05:47:27 +0100 (Sun, 15 Feb 2015)</creat <creation_time>1200603949</creation_time>
ion_time> <modification_time>1567429142</modification_time>
<modification_time>$Date: 2017-07-10 08:34:32 +0200 (Mon, 10 Jul 2
017) $</modification_time>
<summary>Check the version of App</summary> <summary>Check the version of App</summary>
<affected>App in OS v2</affected> <affected>App in OS v2</affected>
<insight>App is a small but very powerful app.</insight> <insight>App is a small but very powerful app.</insight>
<solution type="VendorFix">Please Install the Updated Packages. <solution type="VendorFix">Please Install the Updated Packages.
</solution> </solution>
<detection qod_type="package">Get the installed version with the h elp of detect NVT and check if the version is vulnerable or not.</detection> <detection qod_type="package">Get the installed version with the h elp of detect NVT and check if the version is vulnerable or not.</detection>
<severities> <severities>
<severity type="cvss_base_v2" origin="CVE-2014-9116">AV:N/AC:L/A u:N/C:N/I:N/A:P</severity> <severity type="cvss_base_v2" origin="CVE-2014-9116">AV:N/AC:L/A u:N/C:N/I:N/A:P</severity>
</severities> </severities>
</vt> </vt>
skipping to change at line 1014 skipping to change at line 1057
<vt id="1.2.3.4.5"> <vt id="1.2.3.4.5">
<name>Check for presence of vulnerability X</name> <name>Check for presence of vulnerability X</name>
<refs> <refs>
<ref id="2014-16494" type="fedora" /> <ref id="2014-16494" type="fedora" />
<ref id="https://lists.fedoraproject.org/" type="url" /> <ref id="https://lists.fedoraproject.org/" type="url" />
<ref id="CVE-2014-9116" type="cve" /> <ref id="CVE-2014-9116" type="cve" />
</refs> </refs>
<dependencies> <dependencies>
<dependency vt_id="1.3.6.1.4.1.25623.1.0.50282" /> <dependency vt_id="1.3.6.1.4.1.25623.1.0.50282" />
</dependencies> </dependencies>
<creation_time>2015-02-15 05:47:27 +0100 (Sun, 15 Feb 2015)</creat <creation_time>1200603949</creation_time>
ion_time> <modification_time>1567429142</modification_time>
<modification_time>$Date: 2019-03-15 08:34:32 +0200 (Mon, 10 Jul 2
017) $</modification_time>
<summary>Check the version of App</summary> <summary>Check the version of App</summary>
<affected>App in OS v2</affected> <affected>App in OS v2</affected>
<insight>App is a small but very powerful app.</insight> <insight>App is a small but very powerful app.</insight>
<solution type="VendorFix">Please Install the Updated Packages. <solution type="VendorFix">Please Install the Updated Packages.
</solution> </solution>
<detection qod_type="package">Get the installed version with the h elp of detect NVT and check if the version is vulnerable or not.</detection> <detection qod_type="package">Get the installed version with the h elp of detect NVT and check if the version is vulnerable or not.</detection>
<severities> <severities>
<severity type="cvss_base_v2" origin="CVE-2014-9116">AV:N/AC:L/A u:N/C:N/I:N/A:P</severity> <severity type="cvss_base_v2" origin="CVE-2014-9116">AV:N/AC:L/A u:N/C:N/I:N/A:P</severity>
</severities> </severities>
</vt> </vt>
skipping to change at line 1184 skipping to change at line 1227
<target> <target>
... ...
</target> </target>
<target> <target>
<hosts>192.168.1.0/24</hosts> <hosts>192.168.1.0/24</hosts>
<ports>1,2,3,80,443</ports> <ports>1,2,3,80,443</ports>
<credentials> <credentials>
... ...
</credentials> </credentials>
<exclude_hosts>192.168.1.10-15</exclude_hosts> <exclude_hosts>192.168.1.10-15</exclude_hosts>
<finished_hosts>192.168.1.1-3</finished_hosts>
</target> </target>
</targets> </targets>
</start_scan> </start_scan>
</request> </request>
<response> <response>
<start_scan_response status_text="OK" status="200"> <start_scan_response status_text="OK" status="200">
<id>2f616d53-595f-4785-9b97-4395116ca118</id> <id>2f616d53-595f-4785-9b97-4395116ca118</id>
</start_scan_response> </start_scan_response>
</response> </response>
</example> </example>
 End of changes. 12 change blocks. 
15 lines changed or deleted 57 lines changed or added

Home  |  About  |  Features  |  All  |  Newest  |  Dox  |  Diffs  |  RSS Feeds  |  Screenshots  |  Comments  |  Imprint  |  Privacy  |  HTTP(S)